Hacker Culture Brief History

xiaoxiao2021-03-06  68

Eric S. Raymond 5th A Brief History of HackerDom Hacker Culture

The following content is reproduced since http://hp.envir.online.sh.cn/vega/hacker.htm, English original, please see

http://www.tuxedo.org/~esr/writings/cathedral-bazaar/hacker-history/

This original author is Eric S. Raymond, he is a big brother-level HACKER, wrote a lot of free software, well-known books have Jargon File, in recent years

To publish the "Cathedral and the Market" papers for OpenSource Software, Netscape is willing to publicize the original code of Navigator, which is very large with this article.

relationship.

Order: Real Programmer

The story starts, I want to introduce the so-called Real Programmer.

They never claim to be Real Programmer, Hacker or any special title; `real programer 'This noun appeared in the 1980s,

But since 1945, computer science continues to attract the top top of the world, and the most imagined person is invested. Invention from Eckert & Mauchly

After the AC, there is a feeling of enthusiasm to invest in it, they have written software and play with various programming skills, gradually forming self-consciousness.

A set of technological culture. At that time, the Real Programmers mainly came from the engineering industry and the physical world, they worked with thick glasses, penetrate polyester fiber T-shirt and pure white socks

Sub, use machine language, assembly language, fortran and many ancient language writer. They are the pioneers of the Hacker era, silently contributing, but it is very known.

From the end of the Second World War, it was a MAINFRAMES in the card computer and the so-called "big iron block" dominated by Real Programmer.

Computer culture. Hacker's legendary story, such as Mel (included in Jargon File), Murphy's Law, Mock-German`blinke_

NLight 'The article is a long-standing old and teeth joke.

※ Translator:

Jargon File is also written by the original author of this article, including many HACKER terminology, abbreviation, legend, and more. Jargon file has out

Edition is a book: The New Hacker's Dictionary, Mit Press is published. Also online version: http://www.ccil.org/jargon

※ Translator:

Could not the law: When there are two ways to make you choose, if one of them will lead to failure, you will choose it. It has many derivatives: such as a process

Tested thousands of thousands of thousands of thousands of times before DEMO, but Demo will be biased.

Some Real Programmer is still in the world and is very active (this article is written in 1996). Super computer CRAY designer Seymour Cray, it is said to have a hand

The hardware of the CRAY and its operating system, the operating system is hard to dry with the machine code, no bug or error. Real programmer

It is super!

For more than a more exaggerated example: Stan Kelly-Bootle, the Devil's DP Dictionary book author (McGraw-Hill, 1981

At the beginning of the year, ISBN 0-07-034022-6) and Hacker Legend Specialist, the year in a Manchester Mark I. He is now a columnist writer of computer magazine, writing some scientific humor, meaningful and interesting today Hackers well, so it is very popular. Other people David E. LundStorm,

Write a lot of stories about Real Programmer, including this book in A Few Good Men from UNIVAC, published in 1987, ISBN-0- 262-62

075-8.

※ Translation: See here, everyone should understand, the so-called real programmer refers to the use of a combination language or even machine code, putting a punch for punching PUNCH

A piece of paper card is entered by the host card reader. Programmer.

Real Programmer's era entered an end, replaced, an Interactive Computing, an university established computer-related department and electricity

Brain network. They gave birth to another continuous engineering tradition and finally evolved into today's open code hacker culture.

Early hacker

The Hacker Age has started the first computer DEC PDP-1 in 1961. MIT's TECH Model Railroad Club (TMRC) Power

And Signals Group bought this machine, regard it as the most fashionable technology toy, and various program tools start appearing in computer terminology, the entire environment and the text

Changed, going to today. This has detailed records in front of Steven Levy's book. Hackers' (Anchor / DoubleDay, published in 1984,

※ Translation: Interactive computing does not refer to Windows, Gui, Wysiwyg and other interfaces, there is Terminal, there is shell to be instructions

It is Interactive Computing. The word that uses HACKER should be MIT. Advantages of artificial wisdom in the early 1980s: MIT's Artif

ICIAL Intelligence Laboratory, its core character comes from TMRC. Since 1969, it is exactly the first year of ARPANET, this group of people are in electricity.

The brain science community continues to have major breakthroughs and contributions.

Arpanet is the first high-speed network across the United States. The US Department of Defense has been built, an experimental number communication network, gradually growing up

All universities, the Department of Defense Contractors and the large network of research institutions. All local researchers can cooperate with elastic exchange information with unprecedented speeds of history

The model leads to the sharpness of technology.

Another benefit of Arpanet is that the information motorway makes Hackers around the world to get together, no longer forming a short life of a shares around the world.

Culture, the network will stream them into a powerful force. Start someone feeling the existence of Hacker culture, handling the terminology, publishing online

Aggression and discuss the moral specification that Hacker should have. (JARGON FILE's first version appeared in 1973, it is a good example), Hacker culture is connected

Rapid development between universities at Arpanet, especially (but not all) in information related department.

At first, the entire HACKER culture is developed by MIT's AI Lab, but Stanford University's Artificial Intelligence LA_

Boratory (Sail) is rapidly rising with a later Carnegie-Mellon University (referred to as CMU). Three are all in large information science research

The authority of the heart and artificial wisdom, gathered in the elite around the world, regardless of the technical or spiritual level, has a very high contribution to Hacker culture. In order to understand the story later, we have to look at the changes in the computer itself; with the progress of technology, the protagonist Mit Ai Lab also faded from the red pole

stage.

From the MIT, the HACKER mainly developing platforms are the PDP mini computer sequence of Digital Equipment Corporation. De

C The first Interactive Computing and Time-Sharing operating system mainly developed commercial use. Many universities were a machine that bought DEC.

It is equally elastic and very cheap (relative to a larger computer mainframe). Cheap timing system is Hacker Culture to rapid growth factors

First, in the era of PDP, ARPANET is the world of DEC machines, the most important of which is PDP-10, and PDP-10 is favored by Hacker for fifteen years;

TOPS-10 (DEC's operating system) and MacRo-10 (its group translator), many nostalgic terms and Hacker legend often have these two words.

Mit is like a PDP-10 like everyone, but they disdain with DEC's operating system. They are committed to write one: Legend has a famous ITS.

ITS full name is `Incompatible TimeSharing System ', take this blame, really in line with MIT's funny style - it is to be different, they

Very stinky but enough to write a set of operating systems. ITS is always unstable, design is quirky, BUG is also a lot, but there are still many unique foundations, it seems to be divided

Record holders of the longest boot time in the system.

The ITS itself is written in assembly language, and other parts are written by LISP. LISP is a powerful and very flexible programming in fact, in fact,

Today, twenty-five years, its design is still better than most programming languages. LISP allows ITS's Hacker to make an imagination and function. Li_

SP is the biggest hero of Mit Ai Lab, and now it is still one of Hacker's favorite.

Many ITS's products are still alive; Emacs is probably the most famous one, and ITS's martial arts is still Today's Hacker Zujin,

Like you read in Jargon File. Sail and CMU are not idle when Mit is red. Sail's neutralized subsequently became a PC industry or picture

The horizontal user interface developed. CMU's Hacker developed the first practical large-scale specialized system and industrial robot.

Another harboer is a Palo Alto Research Center, Xerox Parc. From 1970 to 1980, these ten years, PARC is not

Amazing breakthrough and inventions, no matter whether or quantity, software or hardware. For today's window, the mouse, the Lei Yusi table, the region network; its D series

The machine has spawned a strong personal computer with a mini computer. Unfortunately, this group of prophets is not appreciated by the company's high-rise; PARC is special

A good idea to help others make money, become a big joke that everyone knows. Even so, PARC's group of people still contribute to Hacker culture. 1970

The era is growing rapidly with PDP-10 culture. Mailing List's emergence makes people from all over the world to form a lot of SIG (Special-Interest Group).

Not only in the computer, there are also social and entertainment. DARPA is closed against these non-planted 'activities, because of these activities will attract more

Many smart guys put into the computer field.

A famous non-computer technology-related ARPANET MAILING LIST first pushes science fiction, and when ArpaNet turns into an Internet, it is more and more readers to participate in discussions. Mailing List gradually became a public discussion medium, leading to many commercial Internet services such as Compuserve, Genie and Prodigy

Establishment.

Rise of UNIX

At this time, in the suburbs of New Jersey, another mysterious force actively invaded the Hacker society and finally swept the entire PDP-10 tradition. It was born in 1969,

The year was established by Arpanet, a young boy in AT & T Bell Lab, invented UNIX.

Thomspon has participated in the development of Multics, and Multics is from ITS's operating system, which is used to do some of the new OS theory at the time, such as

Take a complex internal structure hide, provide a interface, making the Programmer without deeply understanding the operating system and hardware equipment, and can quickly develop

formula.

Translation: The Programmer write program must thoroughly understand the internal or hardware devices. For example, write IO, for the speed of the hard disk,

The number of magnetic tracks and the number of magnetic heads must be made.

When discovered that Multics was doing white workers, Bell Labs quickly exited (later there was a company Honeywell sold Multics, which was very damn).

Ken Thompson really likes the work environment on Multics, so he wrote an operating system in a scrapped DEC PDP-7 in the laboratory.

There is also his own ideas for the design of Multics. He named this operating system and used to irony Multics.

Translation: In fact, Ken Thompson wrote a game` Star Travel ', there is no place to run, go to a scrap machine PDP-7 to play. His colleague bria_

N kernighan laughed Ken Thompson said: "You write the system is so happy, just call Unics forget it." (Unics pronunciation and eunuch eunuches

Sample), later changed to UNIX.

His colleague Dennis Ritchie, invented a new program language C, and he was rewritten with Thompson with C to write the original unix written by assembly language.

The design principle of c is to use, freedom and flexibility, and C and Unix are quickly welcomed in Bell Labs. 1971 Thompson and Ritchie strive to a office

The project of the room automation system, UNIX started popular in Bell Labs. However, Thompson and Ritchie's ambitions are still more than this.

The tradition of that time is that an operating system must be written completely with assembly language, which will enable the machine to play the highest performance. Thompson and Ritchie, is head

Several technologies that comprehend the hardware and compiler have entered into the operating system, which can be written with high-order languages ​​such as C, still maintain good performance. Five years later, UNIX

It has been successfully ported to several machines.

Translation: Ken Thompson and Dennis Ritchie are the only two engineers who have received Turing Award (Nobel Awards in the computer) (others are scholars).

This is an incredible thing! It means that if UNIX runs on a variety of platforms, UNIX software can be ported to various machines.

It is also not necessary to write software for a specific machine, and can run on UNIX, and the reinvention of the wheel has become a past style.

In addition to the advantages of cross-platform, UNIX and C have many significant advantages. The design philosophy of UNIX and C is Keep IT Simple, Stupid '. Programm_er can easily master the logical structure of the entire C (unlike other or later language) instead of one day to the evening. Unix provides a lot

Useful gadgets, can play a powerful power after appropriate combination (written as a shell script or perl script).

※ Note: The C Programming Language is the thinnest book for all programming books, only more than two hundred pages. The author is Brian Kernighan and

Dennis Ritchie, so the Bible of this C language is also known as `k & r '.

※ Note: `Keep it Simple, Stupid 'referred to as KISS, today Unix does not follow the principle, almost all UNIX is a pile of no

Utilities, the only exception is Minix.

C and UNIX scope of application range, unexpectedly, many areas of research should be used to use computers, they are the best partners. Despite the lack of one

Organizations that formally support them are still spreading in the inside of AT & T. In 1980, it has spread to university and research institutions, and thousands of HACKER want

Put UNIX on the machine.

The main machine running UNIX is the machine of the PDP-11, VAX series. However, due to the high portability of UNIX, it is almost installed on all computer models.

Once the Unix on the new machine is installed, put the software's C original code to recoibly recompile everything, who wants to develop software with assembly language? A set of special

Network designed for UNIX --- UUCP: a low speed, unstable but very costly network. Two UNIX machines use the phone line to connect, you can use mutual

Email. UUCP is built in a UNIX system without additional installation. So the UNIX platform has a exclusive network to form its Hacker culture.

After the first USENET platform in 1980, a large-scale decentralized bulletin board is formed, and the number of people attracted quickly exceeded ARPANET.

A small number of UNIX platforms have Arpanet. PDP-10 starts with UNIX's Hacker culture, but it is not very pleasant. H_ of PDP-10

Acker feels that UNIX's helpers don't understand any new hands, compared to their complex gorgeous, fascinating Lisp and ITS, C and UNIX

The original is so funny. "A group of barbarians wearing the beast tacine ax" they mused.

At this time, there was another new trend of new trend. The first PC appeared in 1975; Apple Computer was established in 1977 to grow fast. micro-

The potential of the computer immediately attracted another young Hackers. Their favorite language is Basic, because it is too simple, the death of PDP-10 is

UNIX fans disdainfully use it, can't afford to use it.

Translation: This group of Hacker has a certain understanding, his name is Bill Gates, which was originally to develop Basic Compiler at 8080.

End of ancient times

In 1980, there were three Hacker culture in development, although there was any contact and communication, but it was also played. Arpanet / PDP-10 culture, play

Is Lisp, Macro, TOPS-10 and ITS. UNIX and C supporters use a telephone line to play their PDP-11 with the VAX machine. There is another group of disappears

The order of micro-computer fans are committed to the civilian technology civil society.

The ITS culture (that is, Mit Ai Lab is also said to reach the whole day, but Wu Yun gradually shrouded this laboratory. ITS decently, the PDP-10 gradually passed, and someone started to leave the laboratory to open the company and commercialize the technology of artificial intelligence. Mit ai lab

Hand can't stop the new company's high salary, and Sail and CMU have also encountered the same problem.

Translation: This situation has a detailed description in the GNU Declaration, please refer to: (Special thanks to ChuhaiBo of Aka into Chinese)

Http://www.aka.citf.net/magazine/gnu/manifesto.html

Deadly hit finally, 1983 Dec announced that in order to focus on the PDP-11 and VAX production line, it will stop producing PDP-10; ITS did not work, because

It cannot be ported to other machines or say no one is at all. And the Unix modified by Berkeley Universty is very smooth in the new VAX, it is ITS.

Ideal substitution. People with vision can see that under the rapid growth of microcomputer technology, UNIX is so late.

Almost at this time Steven Levy completed the `` Hackers '' this book, the main information source is the story of Richard M. Stallman (RMS), he is M

IT Ai Lab leaders, resolutely opposing the research results of the laboratory.

Stallman then founded Free Software Foundation, and fully put into a high quality free software. Levy description him is T_

HE Last True Hacker ', but it turns out that Levy is completely wrong.

Translation: Richard M. Stallman's related deeds please refer: http://www.aka.citf.net/magazine/gnu/cover.htm

Stallman's grand plan can be said to be the epitome of Hacker culture in the early 1980s - in 1982 he started to construct a compatible but new operation

The system is written with C and is completely free. The whole ITS spirit is integrated in a new, unix and vax machine via RMS, HACKER text on a new, unix and VAX machine

. Micro-computer and regional networks have begun to affect Hacker culture. Motorola 68000 CPU plus Ethernet is a powerful combination,

Several companies have successively established the first generation of workstations. In 1982, a group of Berkeley's unix Hacker set up Sun Microsystems, their

The abacus beats: put the UNIX rack in the machine with 68000 CPU, and the best price is in line with most applications. Their delight is the entire industrial tree

A new milestone. Although the workstation is still too expensive for individuals, the workstation is really cheap than mini computers in the company and school. in

In these institutions, the workstation (almost one person) quickly replaced the old huge VAX and other TimeSharing machines.

Translation: The workstation of the workstation production in Sun is used in the Motorola 68000 series, until 1989 launched the SPARC Series for the SPARC Series for the CPU.

Ation.

Private UNIX era

In 1984, AT & T was dissolved, UNIX officially became a commodity. The HACKER culture was divided into two categories, a class of concentrated on the Internet and USENET (Lord

If you run UNIX's mini computer or workstation, it is connected to another CC fan, and most of them are not connected to the Internet.

※ Translation: Taiwan has connected the Internet before INTERNET in 1992, and the players mainly exchange information, but there are regional restrictions and development.

It's better than usenet. Sun with other manufacturers have opened another beautiful new world for Hacker. Workstation appeals are high-performance drawings and networks

In the 1980s, Hacker was committed to writing software, challenging and breakthroughs for workstation, and for one hundred percent of these features. Berkeley development

A set of built-in support from ARPANET Protocols, so that UNIX can easily connect to the network, the Internet also grows more rapidly.

In addition to Berkeley makes UNIX network functions significantly, try to develop a set of graphics interfaces for the workstation. The most famous XWIN_ 要MT

Dow. The key to XWindow's success is fully publicly open, showing Hacker consistent style and spreads to the Internet. X successful drying other business

Example of the graphical interface, there is a profound inspiration and impact on the development of UNIX after several years. A few ITS dead loyalty is still in arbitrary, until the last ITS in 1990

Always shut down to sleep; those dead loyalty is only in the end of the end of the end of Unix.

The UNIX is also divided into Berkeleyunix and AT & T two major camps. Maybe you have seen some posters at the time, painting a titanium wing fighter full speed

In an explosion, the dead star of the trademark of AT & T is printed above. Berkeley UNIX supporters have metapuls that the anti-ruthless corporate empire. Sales

Said that AT & Tunix has not rushed to BSD / Sun, but it won the war of standards. By 1990, AT & T and BSD versions were difficult to distinguish, because each other has

Using the other party's new invention. With the since the 1990s, the position of the workstation gradually received the threat of new cheap high-end PCs, they mainly use Intel80386

Column CPU. The first HACKER can buy a powerful computer that is equivalent to a mini computer in ten years, running a complete UNIX, and can easily connect the network.

The well frog immersed in the MS-DOS world is still not known to these giants. Only a few people are interested in micro-computers, when they play DOS and Mac have exceeded

After the so-called "network national" culture, they have never been there any climate or what aircraft, although there is a masterpiece, but there is no stable development

A cultural tradition, terms dictionary, legendary story and mythical history. They don't have a real network, can only get together in small BBS stations or some failed networks.

FiDonet. Companies that provide Internet services such as CompuServe or Genie business is growing, and the fact that Non-UNIX operating system is not included.

Compiler et al. Development tool, very few Source is circulated on the network, and therefore cannot form the atmosphere of cooperation development software. Hacker's main force,

It is spread all over the Internet, almost a culture of playing UNIX. They don't care about what after-sales service, they want to be better tools.

More Internet time, there is a cheap 32-bitpc.

The machine is available, you can go online, but where is the software to find? Business Unix is ​​worthy, a set of thousands of oceans ($). In the early 1990s, there were companies

Migrate AT & T to BSDunix to the PC. Success, no matter whether the price did not drop, it is more important to have the original code, you can't pay attention.

Modify it to meet your needs or share it to others. Traditional commercial software does not really want to give Hacker.

Even FREESOFTWAREFOUNDATION (FSF) did not write Hacker's operating system, the RMS promised GNU operating system --Hurd said that it took a long time, until 1996 did not see shadow (although the software in 1990, FSF software is already Perform it in all UNIX platforms).

Early free unix

In this empty window, a student in 1992, Helsinkiuniversity, 1992, started to develop a free software on a 386PC

UNIX Kernel, using FSF program development tools.

He quickly wrote a simple version, throwing it to everyone to share it, attracting very many Hacker to help develop Linux-a complete function

Unix, completely free and all of the original code. The biggest features of Linux are not functional advanced but brand new software development models. Until Linux

Before successful, everyone believes that such complex software, it is impossible to work closely with a development team, and coordinate with each other can be written.

The commercial software company and the 1980s FreesoftwareFoundation are in this development model.

Linux is very different from the former. At first it was a large group of Hacker coated together on the web. No strict quality control and high-level decision

The exhibition needle, relying on weekly issued a new version for everyone to download test, the tester will put bug with patch to the network to improve the next version. A new product competition,

Rapid development model of Runmine. Let the guys are dumbfound, the Dong Xiu is remembered, the Linux runs out.

At the end of 1993, Linux development tends to be mature and stable, and the commercial application software is gradually ported to Linux with high UNIX. However, small U_

NIX manufacturers are also closed by Linux's appearance - because no one wants to buy their things. Survivors are completely based on UNIX-based unix

Size code, HACKER joins development to continue to survive.

Hacker culture, once predicted is about to be destroyed, but in the world that is flooded in business software, the thorns, the road is blue, and there is another own

world.

Network big explosive era

Linux can grow rapidly from a fact: Internet is popular, ISP is coming out of the 90s, WORLD-WIDEWEB

The emergence makes the speed of the Internet growth, so as to have suffocating feelings.

The BSD project was officially announced in 1994, and Hacker used the main free Unix (Linux and some derivatives of some 4.4BSD). Linuxcd-ROM

The sales is very good (good to sell pancakes). Hackers have been mainly active in Linux and Internet in recent years. WorldWideWeb let the Internet become

The world's largest transport medium, many of the 1980s and Hackers in the 1990s are now operating ISP.

The prevalence of the Internet, Hacker culture has attached importance to and play its political influence. In the 1994, the US government intends to put some safer, difficult coding

Monitor, do not allow external flow and use. This special case called Clipper Proposal has caused Hacker's group opposition and strong resistance and halfway.

In the 96, Hacker launched another protest movement to deal with improper "Communications Decyact", vows to maintain the speech on the Internet

by.

Computers and Internet will be an indispensable necessities in the 21st century. Modern children will come into contact with Hacker.

Its story legend and philosophy will attract more people to invest. In the future, Hacker is full of light.

转载请注明原文地址:https://www.9cbs.com/read-110290.html

New Post(0)